메뉴 건너뛰기




Volumn 4, Issue , 2011, Pages

Threat Modeling the Cloud Computing, Mobile Device Toting, Consumerized Enterprise - An overview of considerations

Author keywords

cloud computing; consumerization; mobile device security; Threat modeling

Indexed keywords

COMPUTING POWER; INFORMATION SYSTEMS; INFORMATION USE; POINT CONTACTS; PRODUCTIVITY; RISK ASSESSMENT;

EID: 85139103856     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (22)

References (7)
  • 2
    • 24944551836 scopus 로고    scopus 로고
    • NIST Special Publication 800-53, National 1. Institute of Standards and Technology U.S. Department of Commerce
    • NIST Special Publication 800-53 (2007), "Recommended Security Controls for Federal Information Systems", National 1. Institute of Standards and Technology U.S. Department of Commerce
    • (2007) Recommended Security Controls for Federal Information Systems
  • 4
    • 85139110090 scopus 로고    scopus 로고
    • Review, Elsevier Ltd.
    • Review, Elsevier Ltd.
  • 7
    • 85139114837 scopus 로고    scopus 로고
    • Magazine
    • Magazine


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.